Joe, a penetration tester, is tasked with testing the security robustness of the protocol between a mobile web
application and a RESTful application server. Which of the following security tools would be required to assess
the security between the mobile web application and the RESTful application server? (Select TWO).
A.
Jailbroken mobile device
B.
Reconnaissance tools
C.
Network enumerator
D.
HTTP interceptor
E.
Vulnerability scanner
F.
Password cracker